Bitcoin, Bitcoin Cash Block Size chart https:/bitinfocharts.com/comparison/size-btc-bcc.html

2019-04-18: Facebook: Yeah, we hoovered up 1.5 million email address books without permission. But it was an accident!
2019-04-18: MySQL dbdeployer cookbook - usability by example



Securing Splunkweb (Free version) -- THIS WORKS


The Journey to Try Harder: TJnull's Preparation Guide for PWK/OSCP


Ch 9g: Android Hacker Protection Level 0 - DEFCON-22-Strazzere-and-Sawyer-Android-Hacker-Protection-Level-UPDATED.pdf


Ch 3m: Client-side validation


ccdc/linux at master � traviskp/ccdc


Ch 10b: How the EverCrypt Library Creates Hacker-Proof Cryptography


F-1 Curricular Practical T raining (CPT) Request Form -- Required for International Students in CNIT 197 or 198 (Dec. 17, 2018)


60% of small companies that suffer a cyber attack are out of business within six months.


Register for CyberCamp 2019 (Grades 9-12)


2018-10-16: Releases � PowerShell/Win32-OpenSSH � GitHub


DKIM, SPF, and Spam Assassin Validator
Ch 4b: Load Balancing With Round Robin DNS


Evidence Acquisition and Analysis from iCloud


Ch 9b: Snort: Re: Rule for detecting ssh


LionSec/katoolin: Automatically install all Kali linux tools


SpiderMonkey -- Deobfuscates JavaScript Malware ty @lennyzeltser #IRespondCon


Intro to Cutter for Malware Analysis


DLL Hijacking with Ghidra--USE FOR PROJECT


CAPE Sandbox--ADD TO PROJECTS


60% of small companies that suffer a cyber attack are out of business within six months.



1-31-19: 160 added